|
Getting to the Root of Software Security Vendors try to protect their source code from would-be attackers, but it takes only one chink in the armor for a good reverse engineer to penetrate all the defenses so carefully put in place. Find out how to methodically uncover patterns to help you predict where the attacks will be focused and how they will be carried out.
|
|
|
A Look at the Build Tool Ant Tool selection is an important choice in the development process. For any project that relies heavily on Java technology, Ant is a valuable tool for the build process. It is portable, packed with features, and is open source. Moreover, since it is easily extensible, a growing number of additional tasks are available on the Internet.
|
|
|
Hidden Risks in Web Code A look at the HTML source code behind Web sites can often reveal security issues that would never be uncovered by those blissfully ignorant of the code. This bug report will examine two common methods of maintaining state and passing data in Web-based systems–hidden form fields and the HTTP GET method–and demonstrate some of the associated security risks through an examination of HTML code.
|
|
|
Not a Game of Random() Chance Online gaming poses a myriad of security risks. These hazards include various forms of player cheating and the possibility of unfair gaming software, in addition to the risks normally associated with any e-commerce business. Matthew Schmid describes a specific design flaw in an online poker game.
|
|
|
Walking the Fine Line between Helpful and Harmful Jeff Johnson examines user interface problems caused by designers trying to rearrange users' data. He gives examples of software that is too helpful, and concludes that software should support users in their management of displays without managing the displays for them.
|
|